Blog

Jonathan Spring: Attack papers are case studies

Article re-posted from Bentham’s Gaze:¬†https://www.benthamsgaze.org/2018/06/12/attack-papers-are-case-studies/ We should treat attack papers like case studies. When we read them, review them, use them for evidence, and learn from them. This claim is not derogatory. Case studies are useful. But like anything, to be useful case studies need to be done and used Read more…

By Emma Bowman, ago
Blog

RISCS Community Meeting May 2018: Day One

This two day, invitation-only meeting looked at the healthcare sector where the interpretation of complex inputs is crucial to informing risk decisions around data-sharing and public safety, followed by a discussion about how to apply cyber metrics to complex decision-making more generally, asking how data is best presented to the Read more…

By Emma Bowman, ago
Blog

Developer-centred security: Lightning Talks

In the final session of the February 2018 workshop, researchers from ongoing developer-centred security (DCS) projects presented brief introductions to their work, followed by a general discussion. The other sessions from this workshop are: introduction and summary, developer’s den, and reverse panel discussion. Tamara Lopez: Motivating Jenny Tamara Lopez (Open Read more…

Blog

Developer-centred security: Reverse Panel

The third session of the February 2018 developer-centred security (DCS) workshop was a reverse panel discussion in which panellists challenged the audience with provocations. The other sessions from this workshop are: introduction and summary, developer’s den, and lightning talks. For the reverse panel session speakers were invited to pose questions Read more…